A Comprehensive Survey on Backdoor Attacks and their Defenses in Face Recognition Systems

Q Le Roux, E Bourbao, Y Teglia, K Kallas - IEEE Access, 2024 - ieeexplore.ieee.org
Deep learning has significantly transformed face recognition, enabling the deployment of
large-scale, state-of-the-art solutions worldwide. However, the widespread adoption of deep …

Energy-latency attacks via sponge poisoning

AE Cinà, A Demontis, B Biggio, F Roli, M Pelillo - Information Sciences, 2025 - Elsevier
Sponge examples are test-time inputs optimized to increase energy consumption and
prediction latency of deep networks deployed on hardware accelerators. By increasing the …

Beyond the model: Data pre-processing attack to deep learning models in Android apps

Y Sang, Y Huang, S Huang, H Cui - Proceedings of the 2023 Secure and …, 2023 - dl.acm.org
The increasing popularity of deep learning (DL) models and the advantages of computing,
including low latency and bandwidth savings on smartphones, have led to the emergence of …

The SpongeNet Attack: Sponge Weight Poisoning of Deep Neural Networks

J Lintelo, S Koffas, S Picek - arXiv preprint arXiv:2402.06357, 2024 - arxiv.org
Sponge attacks aim to increase the energy consumption and computation time of neural
networks deployed on hardware accelerators. Existing sponge attacks can be performed …

Sponge Attack Against Multi-Exit Networks With Data Poisoning

B Huang, L Pang, A Fu, S Al-Sarawi, D Abbott… - IEEE …, 2024 - ieeexplore.ieee.org
The motivation for the development of multi-exit networks (MENs) lies in the desire to
minimize the delay and energy consumption associated with the inference phase. Moreover …

Energy Backdoor Attack to Deep Neural Networks

HFZ Meftah, W Hamidouche, SA Fezza… - arXiv preprint arXiv …, 2025 - arxiv.org
The rise of deep learning (DL) has increased computing complexity and energy use,
prompting the adoption of application specific integrated circuits (ASICs) for energy-efficient …

Evaluating Model Robustness Using Adaptive Sparse L0 Regularization

W Liu, Z Li, W Chen - International Conference on Advanced Data Mining …, 2024 - Springer
Abstract Deep Neural Networks (DNNs) have demonstrated remarkable success in various
domains but remain susceptible to adversarial examples: slightly altered inputs designed to …

Study on Poisoning Attacks: Application Through an IoT Temperature Dataset

FK Vuseghesa, ML Messai - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The past decade presents a massive adoption of machine learning in divers domains. This
fact has been greatly facilitated by cloud computing, which has made high-performance …